4 c It w Ethical Legal Issues
Transcript of 4 c It w Ethical Legal Issues
-
8/10/2019 4 c It w Ethical Legal Issues
1/31
Computing and IT in the WorkplaceCT006-1
Ethical & Legal Issues
-
8/10/2019 4 c It w Ethical Legal Issues
2/31
CT024 PDT Introduction 2
Learning Outcomes
At the end of this section, YOU should be able to:
To explain and describe the common issues that arises inthe use of computing
To explain and discuss the steps that can be taken toensure proper use of IT
-
8/10/2019 4 c It w Ethical Legal Issues
3/31
CT024 PDT Introduction 3
Topics we will cover
Ethics and Society
Unauthorized use of computers & networks
Software theft
Information privacy
Code of Conduct Spyware and Spam
-
8/10/2019 4 c It w Ethical Legal Issues
4/31
CT024 PDT Introduction 4
Ethics and Society
What are computer ethics ?
Informationprivacy
Intellectual propertyrights rights to which
creators are entitledfor their work
Software theft Information
accuracy
Codes ofconduct
Unauthorizeduse of computers
and networks
Moral guidelines that govern use of computers and informationsystems
-
8/10/2019 4 c It w Ethical Legal Issues
5/31
CT024 PDT Introduction 5
Unauthorized Access and Use
What is unauthorized access and how is itachieved?
Use of a computer ornetwork without permission
Hackers typically break into computer byconnecting to it and then logging in as a
legitimate user
Hacker or cracker, is someone whotries to access a computer
or network illegally
-
8/10/2019 4 c It w Ethical Legal Issues
6/31
CT024 PDT Introduction 6
Unauthorized Access and Use
How can companies protect againsthackers?Intrusion detection software
analyzes network traffic, assessessystem vulnerabilities, and identifiesintrusions and suspicious behavior
Access control defines who
can access computer andwhat actions they can take
Audit trail recordsaccess attempts
-
8/10/2019 4 c It w Ethical Legal Issues
7/31CT024 PDT Introduction 7
Hardware Theft and Vandalism What are hardware theft and hardware vandalism?
Hardware theft is the act ofstealing computer equipment
Cables used to lock equipmentSome notebook computers usepasswords, possessed objects,and biometrics as securitymethods
For PDAs, you can password-protect the deviceHardware vandalism is the act ofdefacing or destroying computer
equipment
-
8/10/2019 4 c It w Ethical Legal Issues
8/31CT024 PDT Introduction 8
Software Theft
What is software theft ?
Act of stealing orillegally copying
software orintentionallyerasing
programs
Software piracyis illegal duplication
of copyrightedsoftware
-
8/10/2019 4 c It w Ethical Legal Issues
9/31CT024 PDT Introduction
Software Piracy Software piracy - unauthorized copying or
distribution of copyrighted software. How? By copying, downloading, sharing, selling or
installing multiple copies onto computers. People don't realize that when you purchase
software, you are actually purchasing a licenseto use it, not the actual software.
That license tells you how many times you caninstall the software, so it's important to read it. Ifyou make more copies of the software than the
license permits, you are pirating. 9
-
8/10/2019 4 c It w Ethical Legal Issues
10/31CT024 PDT Introduction 10
Software Theft
What is a license agreement ?
Right to use softwareSingle-user license agreement allows user to installsoftware on one computer, make backup copy.
-
8/10/2019 4 c It w Ethical Legal Issues
11/31CT024 PDT Introduction 11
Software Theft
What are some other safeguards against
software theft?
Product activation allows user toinput product identification number
online or by phone and receive uniqueinstallation identification number
Business Software Alliance
(BSA) promotes betterunderstanding of software
piracy problems
-
8/10/2019 4 c It w Ethical Legal Issues
12/31CT024 PDT Introduction
BSA
The Software Alliance is a nonprofittrade association to advance the goals of thesoftware industry and its hardware partners,dedicated to promoting a safe and legal digitalworld. Amongst its goals are: Protecting intellectual property (copyright,
patents, tech mandates) Opening markets to barrier-free trade Data security
12
-
8/10/2019 4 c It w Ethical Legal Issues
13/31CT024 PDT Introduction 13
Information Theft What is encryption ?
Safeguards against information theftProcess of converting plaintext (readable data) into ciphertext (unreadable characters)Encryption key (formula) often uses more than one methodTo read the data, recipient must decrypt or decipher the data
-
8/10/2019 4 c It w Ethical Legal Issues
14/31CT024 PDT Introduction 14
Information Theft
What does an encrypted file look like?
-
8/10/2019 4 c It w Ethical Legal Issues
15/31CT024 PDT Introduction 15
IT Code of Conduct What is an IT code of conduct ?
Written guidelines that determine if computer actionis ethicalEmployers can distribute to employees
IT CODE OF CONDUCT
-
8/10/2019 4 c It w Ethical Legal Issues
16/31
CT024 PDT Introduction 16
Information Privacy What is information privacy ?
Legal for employers to use
monitoring software programs
Difficult to maintain today because data is stored onlineEmployee monitoring is using
computers to observe employeecomputer use
Right of individuals andcompanies to restrict collection
and use of information about them
-
8/10/2019 4 c It w Ethical Legal Issues
17/31
CT024 PDT Introduction 17
Information Privacy What are some ways to safeguard personal
information?
Fill in necessary informationon rebate, warranty, and
registration forms
Avoid shopping cluband buyers cards
Install a cookie managerto filter cookies
Inform merchants that youdo not want them to distribute
your personal information
Limit the amount of informationyou provide to Web sites; fillin only required information
Clear your history file whenyou are finished browsing
Set up a free e-mailaccount;
use this e-mail address formerchant forms
Turn off file and printsharing
on your Internet connection
Install a personal firewall
Sign up for e-mailfiltering through your
Internet service provider oruse an antispam program,
such as Brightmail
Do not reply to spamfor any reason
Surf the Web anonymouslywith a program such asFreedom Web Secure orthrough an anonymous
Web site such as
Anonymizer.com
-
8/10/2019 4 c It w Ethical Legal Issues
18/31
CT024 PDT Introduction
What is Anonymizer.com
Is a proxy server that makes Internetactivity untraceable. It protects personallyidentifying information by hiding privateinformation on the user's behalf
When users anonymize their personalinformation it can enable:1. Risk minimization
2. Taboo electronic communications3. Identity theft prevention4. Protection of search history
18
-
8/10/2019 4 c It w Ethical Legal Issues
19/31
CT024 PDT Introduction 19
Information Privacy
Data collected when you fill out form on WebMerchants sellyour electronic
profileOften you canspecify whetheryou wantpersonalinformationdistributed
What is an electronic profile ?
-
8/10/2019 4 c It w Ethical Legal Issues
20/31
CT024 PDT Introduction 20
Information Privacy What is a cookie ?
Set browser toaccept cookies,prompt you toaccept cookies,
or disablecookies
Some Websites sell or
tradeinformation
stored in yourcookies
Small file onyour computerthat contains
data about youUser
preferences
Interests andbrowsing
habits
Howregularlyyou visitWeb sites
-
8/10/2019 4 c It w Ethical Legal Issues
21/31
CT024 PDT Introduction 21
Information Privacy How do cookies work? Step 1. When you type aWeb address of a Web sitein your browser window,the browser programsearches your hard diskfor a cookie associatedwith the Web site.
Step 3. If the Web site does notreceive the cookie info and isexpecting it, the Web site createsan identification number for youin its database and sends thatnumber to your browser. Browserin turn creates a cookie file basedon that number and stores cookiefile on your hard disk. The Website now can update info in cookie
files whenever you access the site.
Web server forwww.company.c
om
Step 2. If thebrowser finds acookie, it sends theinformation incookie file to theWeb site.
-
8/10/2019 4 c It w Ethical Legal Issues
22/31
CT024 PDT Introduction 22
Information Privacy
What is a cookiemanager ?
Software
programthatselectivelyblockscookies
-
8/10/2019 4 c It w Ethical Legal Issues
23/31
CT024 PDT Introduction 23
Information Privacy
Spyware is programplaced on computerwithout usersknowledge
Secretly collectsinformationabout the user
Spam is unsolicitede-mail message sentto many recipients
h
-
8/10/2019 4 c It w Ethical Legal Issues
24/31
CT024 PDT Introduction
What is Spyware
A general term used to describe software
that performs certain behaviors without obtainingyour consent, such as:a) Advertising & Collecting personal information
b) Changing the configuration of your computer Often associated with software that displays
advertisements (called adware) or software that
tracks personal or sensitive information. It can change your computer, causing it to slow
down/crash; change your web browser's
home/search page 24
-
8/10/2019 4 c It w Ethical Legal Issues
25/31
CT024 PDT Introduction 25
Information Privacy
How can you control spam ?
Collects spam incentral location
that you canview any time
Service thatblocks e-mail
messages fromdesignated
sources
E -mail filtering
Sometimesremoves valid
e-mail messages
Attempts toremove spam
Anti -spam program
-
8/10/2019 4 c It w Ethical Legal Issues
26/31
CT024 PDT Introduction 26
Privacy Law
What privacy laws have been enacted?
-
8/10/2019 4 c It w Ethical Legal Issues
27/31
CT024 PDT Introduction 27
Privacy Law
What privacy laws have been enacted? (contd)
-
8/10/2019 4 c It w Ethical Legal Issues
28/31
CT024 PDT Introduction 28
Content FilteringProcess of restricting access to certain material
ternet Contentating Association
ICRA) providesting system ofeb contenteb filtering
oftware restrictsccess to specifiedites
-
8/10/2019 4 c It w Ethical Legal Issues
29/31
CT024 PDT Introduction 29
Review Questions
What are the issues surroundinginformation privacy?Explain the process of encryption and
discuss on why this process is needed.How to prevent unauthorized computeraccess and discuss the implicationsbased on the case study given.
-
8/10/2019 4 c It w Ethical Legal Issues
30/31
CT024 PDT Introduction 30
Q & A
Question and Answer Session
-
8/10/2019 4 c It w Ethical Legal Issues
31/31
Topic and Structure of next session
Security Issues
What we will cover next